It is the reason that you can gain more credibility using our 3-step randomness process certification. With the firmly secure SHA512 Hash, It is almost inconceivable that any modified file can pass step 3 verification. Random Name Picker is a free tool to quickly draw a random name or pick multiple random winners by submitting a list of names. The SHA512 hash code should be the same if the file did not be changed.Ī person can use a fake screenshot or video to change the winner name from local computers, but can not change the information stored on our server. You can let him go to step 3, use our SHA512 Hash Generator to check the downloaded file. Here is Demo of The Client-side Certification File link.įinally, what if another John Doe doubt you have modified the file? In this case, you can go to step 2 to download your client-side certification file to prove that your data source has no error. However, what if somebody doesn't like the winner, and want to check whether there are many duplicate John Doe No. When you give this link and the full winner name to your attendees, most people will trust that your raffle is random. Our server will store a part of the information, including the winner's name (asterisked), total names, timestamp, and a SHA512 hash code. 090, here is Demo of The Server-side Certification Link. If you use Random Name Picker for raffles, contests, drawings, giveaways, and promotions, etc., you are encouraged to enable 3-step Randomness Process Certification function to improve your credibility.įor example, you use the name picker to raffle off a prize to 99 people from John Doe No. For this situation, you can use our 3-step Randomness Process Certification to prove that the whole process is clean and "random." We don't want that somebody use our tool to raffle off a prize, but bypass the random process, and record a video to say, "Hey, we picked a random winner by a tool from ." So we choose a server-side solution.īy using server-side random function, the only thing that the malicious code or a person can change is the data source. It is something which the developers can not control. It can happen in the background process, which other people can not see on the screen. We can write the exact number of participants if it is always the same. For example, we need a random number between 1 and the total number of names to pick a random winner. If using random function from Javascript, as the full source codes are stored on users' local computers, it is impossible to prevent a malicious code or any person from doing something to bypass the random function and set a value to the "winner" directly. high is the high end (the biggest number) of the random range. However, it is a different story on actual real-world operations: Both are the same from the technical part - the random function from Python and Javascript both generate pseudo-random numbers.
0 Comments
Leave a Reply. |